0.03: bug fixes and improvements
The problem
Security is an illusion. Control is an illusion, power, freedom, choice ...
If we look back in history we can see the trend of centralization in all human epochs - concentration of power, responsibility, resources, money, gold, information ...
Tim Berners-Lee created the World Wide Web in year 1989. At its base it is a relatively independent, interconnected computers that communicate with each other in a standardized way. Since there is no way to stretch cables between any two possible points on the Web, there is a hardware-software layer that serves for sending and forwarding of packets over the network to the appropriate recipient.
At this level the institutions that operate are the Internet and telecommunications providers. In case of wireless Internet - means just that you use the GSM operators as ISP instead of the standard one with cable. This is the first vulnerable point. If the supplier wishes - he can become abusive of his power, he can control the content, because he is forced by the authorities, or if someone hacks him, someone else can track all your communication.
Because of this, all the major communications applications made (or at least said they did) encryption of messages from end to end. But almost all of them have another weak point, namely the storage of messages on servers supporting the work and performance of the applications.
If anyone remembers, in the versions of an messaging app that was bought by a big corp, the messages were received and synchronized between two participants only when both players are on the line. This was a disadvantage on one hand, but it is an advantage on other. Now, if the developers of the communication apps decide, they can leave a loophole in the deciphering the messages. The presence of a large set of data on their servers makes it easier to analyze and test for decoding and therefore they become targets for hackers.
On the other hand, even if the owners of communications applications, email and sites with large databases are with good intentions, if they deny access to authorities, the information stored on their servers becomes a target for hackers.
No software is final, there are always bugs, and some of them can open doors for abuse by hackers. Large companies have the means and could afford to invest in Internet security specialists. But even if they invest in security leaks may appear by other means.
Recently it became clear that databases from Several big companies has leaked.
Normal people do not have these resources to protect themselves and some of them live in the delusion that the data is safe just because it is written in the conditions of use.
And here comes the idea that rotates in my head. If you do not want your personal profiles to become part of the leaked databases, it can be done by simply not storing your data and not using these services that export the control from you:
BitSy - synchronize your files - without ever leaving your personal network.
You can find the versions for desktop on this link:
http://tomavelev.programtom.com/bitsy/?l=en_US#downloads
WARNING:
The Application is in BETA. Any feedback will be appreciated.
While in BETA status I don't recommend using it on files and directories that you don't have copy of.
Here is a blog post with a description of the functionality and screenshots:
http://tomavelev.com/blog/BitSy%20-%20Synchronize%20Your%20Personal%20Files?l=en_US
This version of BitSy Android App comes with one universal variant which will work on all the Android devices.
If you are looking to download other versions of BitSy Android App, We have 1 version in our database. Please select one of them below to download.